Menu

M2M FEATURE NEWS

Toyota Prius, Ford Escape at Center of Hacking Target for Def Con Convention

By Steve Anderson July 30, 2013

Imagine for a moment what it would be like to be driving along and have the car suddenly brake while traveling at 80 miles an hour. For those in the know on the car hacking field, this horrifying scenario is a lot more possible than may be expected, and the secrets of making cars do things like this are about to come to light. Thanks to Charlie Miller and Chris Valasek, the Def Con convention running this week in Las Vegas is about to feature many scary possibilities of car hacking.

Miller and Valasek will be publishing a massive 100-page white paper containing detailed blueprints of techniques involved in attacking systems in two main vehicles: the Toyota Prius and the Ford Escape. Miller and Valasek's report is the culmination of several months of study backed up by a grant from the United States government, and will hopefully offer some crucial tips on how automakers and auto owners can sufficiently harden systems against outside incursion before said tips can be used against said vehicles.

Miller and Valasek are said to be part of the “white hat” hacker community, a community that operates in a similar fashion to the “black hat” community, but to different ends. White hat hackers attempt to find flaws in security before said flaws can be used against a company or against users, while black hat hackers look for the same flaws, but to actually use said flaws against the companies and users in question.

The flaws that Miller and Valasek found are disturbing by any measure; with the combination of the flaws that the duo found and the software the duo plans to release to take advantage of said flaws, not only can the aforementioned sudden braking at 80 miles an hour happen, but also several other horrifying possibilities like sudden acceleration, a jerk of the steering wheel, or even remotely disabled brakes under certain conditions.

Terrifying, of course...but there are some conditions here that are noteworthy. When Miller and Valasek did the work, the duo was actually inside the cars, using laptops connected directly to the computer networks in the vehicles. A remote hack on vehicles is much less likely, and would likely require physical contact with the vehicle to accomplish. Still, since the possibilities are so disturbing, it behooves automakers to at least consider them and work to find ways to counteract such attacks before said attacks can be fully realized. Indeed, research into remote hacks has already taken place, and that research is kept under such close guard that few even know what model of car had been hacked.

Granted, it isn't likely that drivers will have to worry about control of vehicles being seized via remote and transferred to persons unknown who will then take the opportunity to conduct a remote joy ride with the vehicle possibly resulting in the former driver's death. But the possibility of malfeasance is there, and as such needs to be prudently addressed for the sake of driver safety. Indeed, Ford and Toyota are already considering Miller and Valasek's research, and that may well mean that by the time the duo shows off the findings, Ford and Toyota will already be well on the way to fixing the problem.




Edited by Alisen Downey

Contributing IoTevolutionworld Writer

SHARE THIS ARTICLE
Related Articles

IoT Developers Celebrate Earth Day by Saving the World

By: Ken Briodagh    4/22/2015

It's Earth Day, a day set aside to remind everyone that we should probably put some effort into not ruining the one planet we have available, and the …

Read More

Kii and Haltian Team up to Tap IoT for Cloud

By: Ken Briodagh    4/21/2015

Cloud platform provider Kii and Finnish wireless device provider Haltian announced on April 21 that they would collaborate together to create state-of…

Read More

What Does the IoT Cost? Now We Can Find Out

By: Ken Briodagh    4/21/2015

With all this talk of what can be connected to the IoT and how it can be done, almost no one seems to be concerned with how much all this is going to …

Read More

IoT Evolution Week in Review: Microsoft, Cisco, Novatel

By: Ken Briodagh    4/18/2015

What a crazy week here at the Evolution offices. The first thing you must have noticed is that we have launched our new look and new home at IoTEvolut…

Read More

Security Leaders Say Beware the Internet of Evil Things

By: Ken Briodagh    4/17/2015

A new report released on April 15 by Pwnie Express, a remote security monitoring vendor, warns about the risks inherent in the so-called "Internet of …

Read More